-
1
-
-
84955563192
-
Stretching the limits of steganography
-
R. J. Anderson, editor, Information Hiding, 1st International Workshop Cambridge, UK, May 30-June 1, Springer-Verlag, Berlin
-
R. Anderson. Stretching the limits of steganography. In R. J. Anderson, editor, Information Hiding, 1st International Workshop, volume 1174 of Lect. Notes in Computer Sc., pages 39-48, Cambridge, UK, May 30-June 1, 1996. Springer-Verlag, Berlin.
-
(1996)
Lect. Notes in Computer Sc.
, vol.1174
, pp. 39-48
-
-
Anderson, R.1
-
2
-
-
78649422691
-
-
July
-
P. Bas and T. Furon. BOWS-2. http://bows2.gipsa-lab.inpg.fr/BOWS2OrigEp3. tgz, July 2007.
-
(2007)
BOWS-2
-
-
Bas, P.1
Furon, T.2
-
4
-
-
84957868624
-
An information-theoretic model for steganography
-
D. Aucsmith, editor, Information Hiding, 2nd International Workshop, Portland, OR, April 14-17, Springer-Verlag, New York
-
C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Information Hiding, 2nd International Workshop, volume 1525 of Lect. Notes in Computer Sc., pages 306-318, Portland, OR, April 14-17, 1998. Springer-Verlag, New York.
-
(1998)
Lect. Notes in Computer Sc.
, vol.1525
, pp. 306-318
-
-
Cachin, C.1
-
6
-
-
50949133669
-
LIBLINEAR: A library for large linear classification
-
Software available at
-
R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C.-J. Lin. LIBLINEAR: A library for large linear classification. Journal of Machine Learning Research, (9):1871-1874, 2008. Software available at http://www.csie.ntu.edu.tw/~cjlin/liblinear.
-
(2008)
Journal of Machine Learning Research
, Issue.9
, pp. 1871-1874
-
-
Fan, R.-E.1
Chang, K.-W.2
Hsieh, C.-J.3
Wang, X.-R.4
Lin, C.-J.5
-
8
-
-
78149233355
-
Minimizing additive distortion in steganography using Syndrome-Trellis Codes
-
Submitted. See
-
T. Filler, J. Judas, and J. Fridrich. Minimizing additive distortion in steganography using Syndrome-Trellis Codes. IEEE Trans. on Information Forensics and Security, 2010. Submitted. See http://dde.binghamton.edu/filler/ publications.php.
-
(2010)
IEEE Trans. on Information Forensics and Security
-
-
Filler, T.1
Judas, J.2
Fridrich, J.3
-
9
-
-
70350562893
-
The Square Root Law of steganographic capacity for Markov covers
-
San Jose, CA, January 18-21
-
T. Filler, A. D. Ker, and J. Fridrich. The Square Root Law of steganographic capacity for Markov covers. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI, volume 7254, pages 08 1-08 11, San Jose, CA, January 18-21, 2009.
-
(2009)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XI
, vol.7254
, pp. 081-0811
-
-
Filler, T.1
Ker, A.D.2
Fridrich, J.3
-
11
-
-
30744445178
-
Perturbed quantization steganography
-
DOI 10.1007/s00530-005-0194-3
-
J. Fridrich, M. Goljan, and D. Soukal. Perturbed quantization steganography. ACM Multimedia System Journal, 11(2):98-107, 2005. (Pubitemid 43099511)
-
(2005)
Multimedia Systems
, vol.11
, Issue.2
, pp. 98-107
-
-
Fridrich, J.1
Goljan, M.2
Soukal, D.3
-
12
-
-
38849102269
-
Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities
-
Dallas, TX, September 20-21
-
J. Fridrich, T. Pevný, and J. Kodovský. Statistically undetectable JPEG steganography: Dead ends, challenges, and opportunities. In Proceedings of the 9th ACM Multimedia & Security Workshop, pages 3-14, Dallas, TX, September 20-21, 2007.
-
(2007)
Proceedings of the 9th ACM Multimedia & Security Workshop
, pp. 3-14
-
-
Fridrich, J.1
Pevný, T.2
Kodovský, J.3
-
13
-
-
4544371135
-
Dimensionality reduction for supervised learning with reproducing kernel hilbert spaces
-
K. Fukumizu, F. R. Bach, and M. I. Jordan. Dimensionality reduction for supervised learning with reproducing kernel hilbert spaces. Journal of Machine Learning Research, (5):73-99, 2004.
-
(2004)
Journal of Machine Learning Research
, Issue.5
, pp. 73-99
-
-
Fukumizu, K.1
Bach, F.R.2
Jordan, M.I.3
-
14
-
-
84864063983
-
A kernel method for the two-sample-problem
-
B. Schölkopf, J. Platt, and T. Hoffman, editors, MIT Press, Cambridge, MA
-
A. Gretton, K. M. Borgwardt, M. Rasch, B. Schölkopf, and A. J. Smola. A kernel method for the two-sample-problem. In B. Schölkopf, J. Platt, and T. Hoffman, editors, Advances in Neural Information Processing Systems 19, pages 513-520. MIT Press, Cambridge, MA, 2007.
-
(2007)
Advances in Neural Information Processing Systems
, vol.19
, pp. 513-520
-
-
Gretton, A.1
Borgwardt, K.M.2
Rasch, M.3
Schölkopf, B.4
Smola, A.J.5
-
15
-
-
0003684449
-
-
Springer-Verlag, Heidleberg, 2nd edition
-
T. Hastie, R. Tibshirani, and J. Friedman. The elements of statistical learning: data mining, inference, and prediction. Springer-Verlag, Heidleberg, 2nd edition, 2009.
-
(2009)
The Elements of Statistical Learning: Data Mining, Inference, and Prediction
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
-
16
-
-
56449086680
-
A dual coordinate descent method for large-scale linear svm
-
ACM
-
C.-J. Hsieh, K.-W. Chang, C.-J. Lin, S. S. Keerthi, and S. Sundararajan. A dual coordinate descent method for large-scale linear svm. In Proceedings of the 25th international conference on Machine learning, ICML '08, pages 408-415. ACM, 2008.
-
(2008)
Proceedings of the 25th International Conference on Machine Learning, ICML '08
, pp. 408-415
-
-
Hsieh, C.-J.1
Chang, K.-W.2
Lin, C.-J.3
Keerthi, S.S.4
Sundararajan, S.5
-
17
-
-
38049111044
-
Batch steganography and pooled steganalysis
-
Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12
-
A. D. Ker. Batch steganography and pooled steganalysis. In Information Hiding, 8th International Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 265-281, Alexandria, VA, July 10-12, 2006.
-
(2006)
Lect. Notes in Computer Sc.
, vol.4437
, pp. 265-281
-
-
Ker, A.D.1
-
18
-
-
38149033612
-
Modified matrix encoding technique for minimal distortion steganography
-
Information Hiding, 8th International Workshop, Alexandria, VA, July 10-12
-
Y. Kim, Z. Duric, and D. Richards. Modified matrix encoding technique for minimal distortion steganography. In Information Hiding, 8th International Workshop, volume 4437 of Lect. Notes in Computer Sc., pages 314-327, Alexandria, VA, July 10-12, 2006.
-
(2006)
Lect. Notes in Computer Sc.
, vol.4437
, pp. 314-327
-
-
Kim, Y.1
Duric, Z.2
Richards, D.3
-
19
-
-
56749154804
-
On completeness of feature spaces in blind steganalysis
-
Oxford, UK, September 22-23
-
J. Kodovský and J. Fridrich. On completeness of feature spaces in blind steganalysis. In Proceedings of the 10th ACM Multimedia & Security Workshop, pages 123-132, Oxford, UK, September 22-23, 2008.
-
(2008)
Proceedings of the 10th ACM Multimedia & Security Workshop
, pp. 123-132
-
-
Kodovský, J.1
Fridrich, J.2
-
20
-
-
70449646940
-
Calibration revisited
-
J. Dittmann, S. Craver, and J. Fridrich, editors, Princeton, NJ, September 7-8
-
J. Kodovský and J. Fridrich. Calibration revisited. In J. Dittmann, S. Craver, and J. Fridrich, editors, Proceedings of the 11th ACM Multimedia & Security Workshop, pages 63-74, Princeton, NJ, September 7-8, 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 63-74
-
-
Kodovský, J.1
Fridrich, J.2
-
21
-
-
77951862698
-
Modern steganalysis can detect YASS
-
January 17-21
-
J. Kodovský, T. Pevný, and J. Fridrich. Modern steganalysis can detect YASS. In Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII, volume 7541, pages 02-01-02-11, January 17-21, 2010.
-
(2010)
Proceedings SPIE, Electronic Imaging, Security and Forensics of Multimedia XII
, vol.7541
, pp. 201-211
-
-
Kodovský, J.1
Pevný, T.2
Fridrich, J.3
-
23
-
-
77952641834
-
Steganalysis by subtractive pixel adjacency matrix
-
T. Pevný, P. Bas, and J. Fridrich. Steganalysis by subtractive pixel adjacency matrix. IEEE Trans. on Information Forensics and Security, 5(2):215-224, 2010.
-
(2010)
IEEE Trans. on Information Forensics and Security
, vol.5
, Issue.2
, pp. 215-224
-
-
Pevný, T.1
Bas, P.2
Fridrich, J.3
-
24
-
-
78549231320
-
Using high-dimensional image models to perform highly undetectable steganography
-
Information Hiding, 12th International Conference, Calgary, Alberta, Canada, June 28-30
-
T. Pevný, T. Filler, and P. Bas. Using high-dimensional image models to perform highly undetectable steganography. In Information Hiding, 12th International Conference, Lect. Notes in Computer Sc., Calgary, Alberta, Canada, June 28-30 2010.
-
(2010)
Lect. Notes in Computer Sc.
-
-
Pevný, T.1
Filler, T.2
Bas, P.3
-
25
-
-
56749152307
-
Benchmarking for steganography
-
K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, Santa Barbara, CA, June 19-21, Springer-Verlag, New York
-
T. Pevný and J. Fridrich. Benchmarking for steganography. In K. Solanki, K. Sullivan, and U. Madhow, editors, Information Hiding, 10th International Workshop, volume 5284 of Lect. Notes in Computer Sc., pages 251-267, Santa Barbara, CA, June 19-21, 2008. Springer-Verlag, New York.
-
(2008)
Lect. Notes in Computer Sc.
, vol.5284
, pp. 251-267
-
-
Pevný, T.1
Fridrich, J.2
-
26
-
-
67749114807
-
Asymptotically optimal perfect steganographic systems
-
B.Y. Ryabko and D.B. Ryabko. Asymptotically optimal perfect steganographic systems. Problems of Information Transmission, 45(2):184-190, 2009.
-
(2009)
Problems of Information Transmission
, vol.45
, Issue.2
, pp. 184-190
-
-
Ryabko, B.Y.1
Ryabko, D.B.2
-
27
-
-
70449657749
-
Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding
-
Princeton, NJ, Sept.
-
V. Sachnev, H. J. Kim, and R. Zhang. Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding. In Proceedings of the 11th ACM Multimedia & Security Workshop, pages 131-140, Princeton, NJ, Sept. 2009.
-
(2009)
Proceedings of the 11th ACM Multimedia & Security Workshop
, pp. 131-140
-
-
Sachnev, V.1
Kim, H.J.2
Zhang, R.3
-
28
-
-
35048819204
-
Model-based steganography
-
T. Kalker, I. J. Cox, and Y.Man Ro, editors, Digital Watermarking, 2nd International Workshop, Seoul, Korea, October 20-22, Springer-Verlag, New York
-
P. Sallee. Model-based steganography. In T. Kalker, I. J. Cox, and Y.Man Ro, editors, Digital Watermarking, 2nd International Workshop, volume 2939 of Lect. Notes in Computer Sc., pages 154-167, Seoul, Korea, October 20-22, 2003. Springer-Verlag, New York.
-
(2003)
Lect. Notes in Computer Sc.
, vol.2939
, pp. 154-167
-
-
Sallee, P.1
-
29
-
-
78049365871
-
A content-adaptive approach for reducing embedding impact in steganography
-
March
-
C. Wang, X. Li, B. Yang, X. Lu, and C. Liu. A content-adaptive approach for reducing embedding impact in steganography. In Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing, pages 1762-1765, March 2010.
-
(2010)
Proceedings IEEE, International Conference on Acoustics, Speech, and Signal Processing
, pp. 1762-1765
-
-
Wang, C.1
Li, X.2
Yang, B.3
Lu, X.4
Liu, C.5
-
30
-
-
45249103920
-
Perfectly secure steganography: Capacity, error exponents, and code constructions
-
June
-
Y. Wang and P. Moulin. Perfectly secure steganography: Capacity, error exponents, and code constructions. IEEE Transactions on Information Theory, Special Issue on Security, 55(6):2706-2722, June 2008.
-
(2008)
IEEE Transactions on Information Theory, Special Issue on Security
, vol.55
, Issue.6
, pp. 2706-2722
-
-
Wang, Y.1
Moulin, P.2
|